Vulnerabilities
Vulnerable Software
Openbsd:  >> Openbsd  Security Vulnerabilities
IP fragment assembly in OpenBSD 2.4 allows a remote attacker to cause a denial of service by sending a large number of fragmented packets.
CVSS Score
5.0
EPSS Score
0.007
Published
2001-03-12
cron in OpenBSD 2.5 allows local users to gain root privileges via an argv[] that is not NULL terminated, which is passed to cron's fake popen function.
CVSS Score
7.2
EPSS Score
0.001
Published
2001-03-12
Vulnerability in OpenBSD 2.6 allows a local user to change interface media configurations.
CVSS Score
4.6
EPSS Score
0.001
Published
2001-03-12
One-byte buffer overflow in replydirname function in BSD-based ftpd allows remote attackers to gain root privileges.
CVSS Score
10.0
EPSS Score
0.156
Published
2001-02-12
OpenBSD 2.6 and earlier allows remote attackers to cause a denial of service by flooding the server with ARP requests.
CVSS Score
5.0
EPSS Score
0.077
Published
2000-12-19
The IPSEC implementation in OpenBSD 2.7 does not properly handle empty AH/ESP packets, which allows remote attackers to cause a denial of service.
CVSS Score
5.0
EPSS Score
0.009
Published
2000-12-19
Format string vulnerability in pw_error function in BSD libutil library allows local users to gain root privileges via a malformed password in commands such as chpass or passwd.
CVSS Score
7.2
EPSS Score
0.002
Published
2000-12-19
Format string vulnerability in OpenBSD fstat program (and possibly other BSD-based operating systems) allows local users to gain root privileges via the PWD environmental variable.
CVSS Score
7.2
EPSS Score
0.001
Published
2000-12-19
Format string vulnerability in OpenBSD yp_passwd program (and possibly other BSD-based operating systems) allows attackers to gain root privileges a malformed name.
CVSS Score
7.2
EPSS Score
0.001
Published
2000-12-19
Format string vulnerability in OpenBSD su program (and possibly other BSD-based operating systems) allows local attackers to gain root privileges via a malformed shell.
CVSS Score
7.2
EPSS Score
0.001
Published
2000-12-19


Contact Us

Shodan ® - All rights reserved